Write a class named Add that has the following data members, constructor, and methods:

Data Members:
private int row; // The number of rows for the addition table.
private int column; // The number of columns for the addition table.
Constructor:
// Sets the values of the above data members.
public Add ( )
Methods:

Answers

Answer 1

Answer:

A class is like a blueprint of object.

Explanation:

A class defines the kinds of data and the functionality their objects will have.

A class enables you to create your own custom types by grouping together variables of other types, methods and events.

In C#, we can create a class  using the class keyword.

Here's a sample program:

using System;

namespace ConsoleApplication

{

   public class Test

   {

       public static void Main()

       {

           Add a1 = new Add(70, 50);

           a1.AddNumbers();                    

           Console.ReadLine();

       }      

   }

     class Add

   {

       private int row;

       private int column;

       public Add(int r, int c)

       {

           row = r;

           column = c;

       }

       public void AddNumbers()

       {

           Console.WriteLine(row+column);

       }

   }

}

output: 120

Explanation of the program:

I have created a class named Add. Within a class, row and column are two fields and AddNumbers() is a method. We also have constructor to initialize row and column.

In main method, If I need to invoke members of the class, I must create  an instance of the class. We can create any number of instances using the single class.IN our program, a1 is the reference variable using which we can invoke members of the class. I invoked function in the class and passed arguments to the constructor while creating an instance.

Those values are assigned to method variables and it operated the addition. Thus the output is 120.


Related Questions

The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated user is allowed to perform the requested action.

Answers

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

What is access control?

By validating various login credentials, such as passwords and usernames PINs, biometric scans, and tokens, access control identifies users. A type of credential known as an authentication factor is one that is used to verify, often in conjunction with other factors.

Multifactor Authentication is a technique that needs multiple authentication methods to validate a user's identity is another feature found in many access control systems. The three AAA are authentication, authorization, and accounting.

Therefore, authorization refers to confirming that a user who has been authenticated is permitted to carry out the specified action.

To learn more about authentication, refer to the below link:

https://brainly.com/question/13553677

#SPJ2

How is the bootstrap program started?

Answers

Answer:

Bootstrapping :- It refers when a process does not require any input from outside to start.

Bootstrap program:- It is the first code that is executed when the computer system is started.

Bootstrap program is a part of ROM and it is non-volatile memory. Then the  operating system is loaded in the RAM by bootstrap program after the start of the computer system. Then the operating system starts the device drivers.

A bootstrap program is the first code that is executed when the computer system is started. ... The operating system is loaded into the RAM by the bootstrap program after the start of the computer system. Then the operating system starts the device drivers.

Describe a method for protecting users against URL obfuscation Attacks

Answers

Answer:

Anti-Phising softwares in stand alone systems connected to  a centralized database.

Explanation:

In order to protect oneself from URL obfuscation attacks one should install anti-phising software in their systems which is a software to warn users when exposed to obfuscation attacks. These software when connected contains a centralized database maintained which warns users when they try to access an effected URL. So upon clicking such URL the users are warned in their screen and thus provided with an option to return to their previous page.

Anti-phising software come handy in preventing such attacks while accessing certain URLs in their mails also.

True / False
Variable length instructions generally use memory more efficiently than fixed-length instruction sets.

Answers

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

What is one of the problems with project managementsoftware?

The project manager manages the software instead of theproject
Project duration calculations are sometimesapproximate
You cannot override the project management softwaredecisions regarding schedule
It’s expensive and difficult touse

Answers

Answer: It’s expensive and difficult to use

Explanation:

 The problems with project management software is that it is expensive and difficult to use as, the scale of project grow and their impact reach beyond the functional unit. Budget is one of the main issue in planning and tracking. It is time intensive to learn and refresh the interface design and also there is no invoicing or billing included.

______ organizations have physical and online dimensions

A. clicks and mortar

B. pure-play

C. virtual

D. brick and mortar

Answers

Answer:

Click and Mortar

Explanation:

In the e-commerce world, a click and mortar organization is a type of business model that includes both its operations in the online and offline domains. Clients are able to shop online and at the same time visit the retailer’s store. It is able to offer its clients fast online transactions and face-to-face service.

Further explanation

Electronic Commerce Describes the process of buying, selling, sending, or exchanging products, services, and / or information through computer networks, including the Internet.

Electronic Business refers to a broader definition of the EC, not only buying and selling goods and services, but also serving consumers, collaborating with business partners, conducting e-learning, and conducting electronic transactions in organizations.

3 forms of EC organization:

• Brick-and-Mortar:

Is an organization that does business offline, sells physical products, and also physical agents.

• Virtual (Pure Play):

Is an organization that conducts business activities only online.

• Click-and-Mortar:

Clicks and mortar refers to the use of electronic sales (CLICK) by combining traditional methods of operation (brick and mortar). Cliks and mortar also refers to the development of electronic commerce that is side by side with conventional business operations by utilizing the strengths in each of the complementary and synergistic channels.

Clicks and mortar, companies can successfully develop parallel electronic trade in parallel with brick and mortar. The level of integration between the two channels is manifested in several dimensions: the actual business processes used for company transactions, the company's brand identity, ownership and management in each channel.

Is an organization that carries out several EC activities, but does major business in the physical world.

E-Marketplace is an online marketplace where buyers and sellers meet to exchange goods, services, money, or information.

Learn  More

clicks and mortar : https://brainly.com/question/12914277

Details

Class: college

Subject: computers and technology

Keywords : clicks and mortar, Electronic Commerce, Electronic Business, E-Marketplace

You use the ____ data type to hold any single character.

a.
single

b.
char

c.
float

d.
byte

Answers

b. char. Char is short for character.

The decision-maker's attitude toward riskcan change the outcome of a situation involving risk.
True
False

Answers

Answer: True

Explanation: Yes, there is a major impact of the decision maker's attitude on a risky situation. In risky situation if the decision maker is on side of taking non-risking decision then there would be less chances of severe outcome but if the decision maker tends to take risk then the situation can have any sort of impact good or bad as outcome. Therefore there is a huge impact of decision makers attitude.

Data mining is becoming increasingly common in both theprivate and public sectors. Discuss

What do you understand by DATA MINING?
Study and discuss where and how DM can beused?

Answers

Answer:

Data Mining is the process of getting important data from the given set of large amount of data based on some attributes and dimensions

Explanation:

Data Mining can be used in all kind of organizations to take some important decisions based on historical data

TRUE/FALSE

The Interrupt Flag (IF) controls the way the CPU responds to all interrupts.

Answers

Answer: True.

Explanation:

The value of the IF is very important to respond to the interrupts in the OS. It is a system flag bit. All the hardware interrupts will be handled if the flag value is set to 1 else all interrupts will be ignored. It takes two values either 1 or 0.

You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using the above given online update formulas which should be displayed on the console screen. The program should end when a user enters a negative number.

Answers

Answer:

# In the new version of python is available the functions mean() an variance()

# In the module of statistics

i = 0 #Var to input the elements

l = [] #Var to store the elements on a list

while(i>0):

    print("In put a positive number to add in the list or negative to exit ")

    i = input()

    l.append(i)

    print("The mean of the all elements is: " + mean(l) )

    print("The variance of the all elements is: " + variance(i) )

Explanation:

At present, you can use in the news python's verison e.g. (python 3.7) the statistics module and use functions like mean(), variance(), stdev() and many others.

In the first step you create two variables, i to recieve the inputs of a loop and l to store all the elements recieved in the i variable. after that you pass as an argument the list that you stored before and get the mean() and variance() of the all elements in the list.

I hope it's help you.

function getLongestString(strings) { } /* Do not modify code below this line */ const strings = ['long', 'longer', 'longest']; console.log(getLongestString(strings), '<-- should be "longest"');

Answers

Answer:

function getLongestString(strings) {  

return strings.reduce( (acc, cur) => acc.length > cur.length ? acc : cur);

}

Explanation:

A reducer applies the same operation to each array element. In this case, the longest string is stored in the accumulator (acc), and is replaced only by the current element (cur) if the current element is longer than the accumulator.

What is Service Oriented architecture & How is it different form Object Oriented Middleware?

Answers

Answer: This can be explained s follows :-

Explanation: The approach in which services available in the network are used by the applications is called service oriented architecture. In such structure a business function is provided by each service that is independent of other services.

Object oriented programming is a programming paradigm. OOP can be used outside of that architecture or it can be apart of SOA as well .

Write a short note on Façadepattern.

Answers

is a software design pattern commonly used with object-oriented programming. The name is by analogy to an architectural facade. A facade is an object that provides a simplified interface to a larger body of code, such as a class library. I looked it up hope it helps

a network on the internet has a subnet mask of 255.255.240.0.what is the maximum number of hosts it can handle?

Answers

Answer:

4094 hosts

Explanation:

In a network,

     Number of hosts is (2^host no -2)

We have subtracted 2 because out of these hosts two are used in broadcasting and other purposes.  

Host number is equal to the 0's in the Subnet mask

                    255.255.240.0

convert this into binary number i.e

   11111111.11111111.11110000.00000000

So,12 0's are there

           Number of valid hosts= 2^12 -2

                                                = 4096-2

                                                =  4094

What are the differences between responsibility,accountability and liability?

Answers

Answer: Responsibility is the process when one has an authority over another, accountability means to be answerable to the action of the concerned and liability means to be legally responsible for the concerned.

Explanation:

A person who is responsible must be accountable and vice versa. In liability the person responsible must be governed by some documents for legal bindings to be help responsible for someones else action.

If the data needs to be processed in a First In First Out (FIFO) manner, we typically use a(n) ____.

A.
stack

B.
queue

C.
map

Answers

Answer:

B. queue

Explanation:

If the data needs to be processed in a First In First Out (FIFO) manner, we typically use a queue.

True / False
. Fixed-length instruction architectures do not use memory as efficiently as variable-length architectures.

Answers

Answer:

TRUE. Variable length instruction architectures are better at memory efficiency than fixed length architectures.

Explanation:

Variable length instruction architectures use memory efficiently than fixed length architectures. Fixed length instructions are used in RISC (Reduced Instruction Set Computers) , where as CISC (Complex Instruction Set Computers ) have instructions of variable length. In fixed instruction length architectures if the instruction has shorter length than that of fixed length it requires padding to increase the instruction length to fixed length. This is wastage of memory.

In Java a final class must be sub-classed before it.
?? True

?? False

Answers

Answer: False

Explanation: In java, whenever a final class is declared it cannot be extended further and also it is not possible for a declared class to be overridden in the sub class. A class can be declared final by using the final keyword. Final class cannot be extended but they can be used to extend the other classes.Therefore the final class cannot be sub classed before it in java.

Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Roman numeral version of that number. Input Validation: Do not accept a number less than 1 or greater than 10. Prompts And Output Labels. Use the following prompt for input: "Enter a number in the range of 1 - 10: ". The output of the program should be just a Roman numeral, such as VII.

Answers

cout<<"Enter a number in the range of 1 - 10 ";

cin>>num;

// check if the input is valid

if(num<0 || num > 10)

cout<<"Invalid Number"

// checking for appropriate output

switch(num){

case 1:

cout<< "|";

case 2:

cout<< "||";

case 3:

cout<< "|||";

case 4:

cout<< "|V";

case 5:

cout<< "V";

case 6:

cout<< "V|";

case 7:

cout<< "V||";

case 8:

cout<< "V|||";

case 9:

cout<< "|X";

case 10:

cout<< "X";

default :

cout<<" Nothing found";

}

Final answer:

The program asks the user to enter a number between 1 and 10 and uses a switch statement to convert it to a Roman numeral, with input validation to ensure the number is within the specified range.

Explanation:

Converting Numbers to Roman Numerals Using a Switch Statement

To write a program that asks for a number in the range of 1 through 10 and converts it to a Roman numeral, we can utilize a switch statement. Here is an example code in a programming language like C++ or Java:

#include <iostream>
using namespace std;
main() {
 int number;
 cout << "Enter a number in the range of 1 - 10: ";
 cin >> number;
 switch(number) {
   case 1: cout << 'I'; break;
   case 2: cout << 'II'; break;
   case 3: cout << 'III'; break;
   case 4: cout << 'IV'; break;
   case 5: cout << 'V'; break;
   case 6: cout << 'VI'; break;
   case 7: cout << 'VII'; break;
   case 8: cout << 'VIII'; break;
   case 9: cout << 'IX'; break;
   case 10: cout << 'X'; break;
   default: cout << "Error: invalid input.";
 }

 return 0;
}
This program will display a Roman numeral corresponding to the number entered by the user, ensuring that input validation is performed and only numbers between 1 and 10 are accepted.

The value of a default argument must be a(n) _________.

Answers

Answer:

Constant

Explanation:

A default argument is a value provided in a function declaration that the compiler automatically assigns if the function caller does not provide a default value for the argument.

The value of a default argument must be constant.

The default value parameter must be a  constant for compiling. Compiler does not accept dynamically calculated value against optional parameter. The reason behind this it is not certain that the dynamic value you provide would offer some valid value.

Example:

#include<iostream>  

using namespace std;  

/*A function with default arguments, it can be called upto 4 arguments*/

int sumnum(int x, int y, int z=0, int w=0)  

{  

return (x + y + z + w);  

}  

int main()  //driver function

{  

cout << sumnum(10, 15) << endl;  

cout << sumnum(10, 15, 25) << endl;  

cout << sumnum(10, 15, 25, 30) << endl;  

return 0;  

}

Output

25

50

80

Describe business benefits of using wireless electricity?

Answers

Answer:

To put it simply, the main benefit for a business to use wireless electricity is money.

Explanation:

Assuming that the company in question can solve specific hurdles such as Microwave Interference and Implementation costs. Then they would save a huge amount of money in the mid to long term since wireless electricity needs very little landscape and does not need cables and transmitting towers as opposed to traditional electrical systems.

Hope you have found this explanation helpful and If you have any more questions please feel free to ask them here at Brainly, We are always here to help.

Wireless electricity offers businesses enhanced reliability, reduced transmission losses, and operational flexibility. Smart Grid principles further improve efficiency and optimize energy usage. These benefits lead to greater cost savings and improved service reliability.

Wireless electricity offers several significant advantages for businesses:

Enhanced Reliability: Generating electricity at the point of use enhances the reliability of the electricity supply, ensuring that critical circuits remain powered during grid outages.Reduced Transmission Losses: By avoiding the need to convey electricity from central power generators to urban loads, businesses can eliminate energy losses typically around 7% due to transmission inefficiencies.Operational Flexibility: Wireless operations enable services and applications that are simply impossible or impractical with wired systems, especially for long-range communications and distributed electricity production.

Implementation and Efficiency

Future electrical transmission and distribution systems will become more efficient with the implementation of "Smart Grid" principles. These grids use smart meters and time-of-use pricing to optimize energy consumption during non-peak times, such as using electricity at night for heating water or charging electric vehicles, which can help level load and reduce peak demand.Moreover, transmitting electricity at high voltage and low current over long distances with wireless technology minimizes energy losses due to resistance heating, known as Joule heating, thus making the entire process more energy-efficient.

Consumer Advantages

Changes in equipment and usage patterns at the consumer end to allow for increased efficiencies, improved reliability, and lower energy costs are expected to benefit businesses greatly. For instance, ice-making air conditioning systems that operate during non-peak hours can provide cooling during peak demand hours, contributing to overall efficiency and cost savings.

int[] array1 = {1, 3, 5, 7}

for(int i =0; i if(array1[i] > 5)
System.out.println(i +" " + array1[i]);


Which indices are in bounds for the array array1, given thedeclaration above?

0, 1, 2,3
1, 2, 3,4
1, 3, 5,7
0, 1, 3,5

Answers

Answer:   0,1,2,3

Explanation:

The array contains 4 elements that is 1,3,5,7.So the size of the array is 4.The indexing in an array starts from 0 means the element at 0 index is the first element in the array So 1 is at the index 0 and the index will increase by 1 as we move right of the array.So 3 is at the index 1 ,5 is at the index 2 and 7 is at the index 3.So the indices are 0,1,2,3.

Write a program that stores the value 16 in the variable length and the value 18 in the variable width. Have your program calculate the value assigned to the variable perimeter using the formula perimeter = 2 * length + 2 * width. Have your program print the value stored in perimeter.

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

  int length = 16;

   int width = 18;

   int perimeter = (2*length) + (2 * width);

   cout<<"The perimeter is: "<<perimeter<<endl;

}

Explanation:

First include the library iostream in the c++ program for input/output.

then, create the main function and define the variable with given values in the length and width.

After that calculate the perimeter by using the formula.

perimeter = 2*length + 2*width

and finally display the output  on the screen by using the cout instruction.

Write a recursive method to return the number of uppercase letters in a String. You need to define the following two methods. The second one is a recursive helper method. public static int count(String str) public static int count(String str, int high) For example, count("WolFIE") returns 4.

Answers

Answer:

Recursive function with two parameters that return the number of uppercase letters in a String

public static int count(String str,int h)//Defining function

{

      if(str.charAt(0)>='A' && str.charAt(0)<='Z')//Checking the characters from A to Z

{

          h++; //incrementing the counter

          if(str.length()>=2){

              return count(str.substring(1),h);//recalling function

          }

      }

      if(str.length()>=2){

              return count(str.substring(1),h); //recalling function

      }

      return h;

  }

This is the recursive function with the name count of return type integer,having parameters str of string type and h of integer type.In this we are checking the characters at a particular position from A to Z.

Recursive function with one parameter that return the number of uppercase letters in a String

public static int count(String str)//Defining function

{

      if(str.charAt(0)>='A' && str.charAt(0)<='Z')//Checking the characters from A to Z

{

          count++; //incrementing the counter

          if(str.length()>=2){

              return count(str.substring(1));//recalling function

          }

      }

      if(str.length()>=2){

              return count(str.substring(1)); //recalling function

      }

      return count;

  }

This is the recursive function with the name count of return type integer,having parameters str of string type .In this we are checking the characters at a particular position from A to Z.

Java program that return the number of uppercase letters in a String

import java.util.*;

public class Myjava{

static int count =0;//Defining globally  

 

public static int count(String str,int h)//Defining function

{

      if(str.charAt(0)>='A' && str.charAt(0)<='Z')//Checking the characters from A to Z

{

          h++;

//incrementing the counter

          if(str.length()>=2){

              return count(str.substring(1),h);//recalling function

          }

      }

      if(str.length()>=2){

              return count(str.substring(1),h);

//recalling function

      }

      return h;

 

  }

  public static void main(String[] args)//driver function

  {

      System.out.println("Enter a string");//taking input

      Scanner scan = new Scanner(System.in);

      String s = scan.nextLine();

      int h =0;

      System.out.println("Counting the Uppercase letters: "+count(s,h));

  }

}

Output

Enter a string  WolFIE

Counting the Uppercase letters: 4

Final answer:

The question involves writing two methods to recursively count the number of uppercase letters in a String: a base method and a recursive helper method. The base method initiates the recursion with the string and its length, while the helper method implements the recursive logic, decrementing the count and checking for uppercase characters.

Explanation:

The question asks for the development of a recursive method to count the number of uppercase letters in a given string. This involves writing a base method count(String str) that initiates the recursion and a helper method count(String str, int high) which performs the actual recursive logic.

Method Definition

To achieve this, first, the base method needs to call the recursive helper method with the initial parameters - the string itself and the length of the string as the starting point. The recursive method will then decrement the count while checking for uppercase characters until it reaches the base case where the index (or high) is less than 0.

Example Implementation

public static int count(String str) {
   return count(str, str.length() - 1);
}

public static int count(String str, int high) {
   if (high < 0) {
       return 0;
   } else {
       int count = Character.isUpperCase(str.charAt(high)) ? 1 : 0;
       return count + count(str, high - 1);
   }
}

In this example, count("WolFIE") will indeed return 4, as it correctly identifies 'W', 'F', 'I', 'E' as uppercase letters.

.When a design begins with a consideration of what the systemmust accomplish, it is called:
A.user-centered design B.data-driven design C.event-driven design D.task-centered design

Answers

Answer: D) Task-centered design

Explanation: Task centered design is the technique for a design to made in such a way that it can have the desired or expected result . The goals are set in it and the task is decided in a particular structure. Thus a design having any such system , it is known as task centered design. It is mainly focused on the user and the way this design can be used by them.

IMUL & IDIV operate on
a. Two's complement number, b. one's complementnumber, c. all of the give option, d. none of these

Answers

Answer: a) Two's complement number

Explanation: IMUL that is referred as signed multiply which performs the multiplication operation of two operands and IDIV is the referred as the signed division which performs the division between two operands. They perform their action on the two's complement number because of their signed behavior otherwise unsigned multiplication(MUL) and division(DIV) are  also present for other numbers.

Write a program which will ask the user to input a floating point number corresponding to temperature. We will assume the temperature was in Celsius degrees and display its equivalent in Fahrenheit degrees after computing it using the following formula Fahrenheit = ( 9.0 / 5.0 ) * Celsius + 32

Answers

// writing c++ code...

// taking input

cout<< " Enter the floating point number : ";

cin>>fnumber;

// calculating the Fahrenheit temp

far_temp= (9.0/5.0) * fnumber +32;

cout<<" Fahrenheit = "<< far_temp;

Write the half function. A function call and the functionprototype
are provided.

void half(float *pv);

float value=5.0;

printf("Value before half: %4.1f\n",value); // Prints 5.0

half(&value);

printf("Value after half: %4.1f\n",value); // Prints 2.5

Answers

Answer:

C code for half()

#include<stdio.h>

void half(float *pv);

int main()

{

float value=5.0;  //value is initialized  

printf ("Value before half: %4.1f\n", value); // Prints 5.0

half(&value);  // the function call takes the address of the variable.

printf("Value after half: %4.1f\n", value); // Prints 2.5

}

void half(float *pv) //In function definition pointer pv will hold the address of variable passed.

{

*pv=*pv/2;  //pointer value is accessed through * operator.

}

This method is called call-by-reference method. Here when we call a function, we pass the address of the variable instead of passing the value of the variable. The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(),  we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main(). Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.

Output:

Output is given as image.

Suppose you create a new PricedApt class that is derived from the RentalApt class (so it's derived from a derived class). It adds one new double attribute, price, which tells what the monthly rental for the apartment is. Here is a constructor call for the class: PricedApt p = new PricedApt("jill", 900, true, "jack", 1050.00); The class is missing its constructor. In the box provided below, write the constructor in its entirety. public class PricedApt extends RentalApt { private double price;

Answers

// here i am writing C++ code

public class PricedApt extends RentalApt {

private double price;

RentalApt(firstname,price,b,lastname): PricedApt(firstname,b,lastname){

// As there is only one member in this class this means that every argument //coming to it is supposed to be passed to the parent class constructor.

// in c++ : operator is used to call the super class constructor

this.price = price;

}

}

Other Questions
Consider the quadratic function f(x)=8x27x+6. What is the constant of the function? Summarize the steps of the scientific method. Estela (1) ( estaba / estuvo ) leyendo un libro cuando Toms la (2) ( llamaba / llam ) por telfono. Toms la (3) ( invitaba / invit ) a ir a un restaurante esa noche. Estela (4) ( tena / tuvo ) mucha tarea que hacer, pero (5) ( aceptaba / acept ) la invitacin de Toms. Toms (6) ( llegaba / lleg ) a las ocho y ellos (7) ( salan / salieron ). (8) ( Haca / Hizo ) buen tiempo y ellos (9) ( decidan / decidieron ) caminar al restaurante. Mientras (10) ( caminaban / caminaron ) por la calle, se (11) ( hablaban / hablaron ) cariosamente. Entonces, Toms (12) ( sacaba / sac ) un regalo pequeo de su chaqueta y se lo (13) ( daba / dio ) a Estela. Estela (14) ( abra / abri ) el regalo rpidamente. (15) ( Era / Fue ) un reloj. La semana pasada Estela (16) ( perda / perdi ) su reloj y por eso (17) ( necesitaba / necesit ) un reloj nuevo. Most animals can be classified asInvertebrates Arthropods ChordatesSessile Which of these statements best describes the role of creativity in science? A. it helps scientists prove non-observable theories B. it helps scientists make conclusions non-testable C. it helps scientists give valid scientific explanations D. it helps scientists create theories which are universal Querido Pepe:La semana pasada 1.[FILL] (yo: hacer) un corto viaje a Acapulco porque 2.[FILL] (tener) una reunin con mi agente de viajes. Aunque (Although) 3.[FILL] (estar) ocupadsimo, 4.[FILL] (querer) visitarte, pero 5.[FILL] (saber) por nuestro amigo Luis Dvila que estabas (you were) fuera de la ciudad. Yo le 6.[FILL] (dar) a Luis unas fotos de la ltima vez que nosotros 7.[FILL] (estar) juntos (together), y le 8.[FILL] (yo: pedir) que te las diera (he give) a tu vuelta a Acapulco. Espero verte durante mi prximo viaje. Recibe un abrazo (hug) de tu amigo, Gerardo Match each poem with the subculture or counter culture from which it came. FeministBeat Generation Hip-Hop CountercultureA. For no Church told me/no Guru holds me/no advice/just stone/of New York( jack kerouacB. You fit into me/like a hook into an eye/a fish hook/an open eye(Margaret Atwood)C. Pay attention, heres the thick of the plot/I pulled up To the corner at the end of the block for slush and thats when I saw the beautiful girly-girl walking /I picked up my car want to penetrate like I was talking( DJ jazzy Jeff and the fresh prince 12.03,1.2,12.3,1.203,12.301 order least to greatest find the permiter of the polygon PLEASE help Cathy lives in a state where speeders fined $ 10 for each mile per hour over the s speed limit cathy was given a fine for $80for speeding on a road where the speed limit is 50 miles per hour how fast was cathy driving Estimate the fur seal pup population in Rookery A 5498 fur seal pups were tagged in early August In late August, a sample of 1300 pups was cbserved and 157 of these were found to have been previously tagged. Use a proportion to estimate the total number of fur seal pups in Rookery A The estimated total number of fur seal pups in Rookery A is Round to the nearest whole number.) Name the three types of peer pressure. Give examples as well please. :) is 42 a multiple of 7 What is the maximum thermal efficiency possible for a power cycle operating between 600P'c and 110C? a). 47% b). 56% c). 63% d). 74% A worker is cutting a square from a piece of sheet metal. The specifications call for an area that is 16 cm squared with an error of no more than 0.03 cm squared. How much error could be tolerated in the length of each side to ensure that the area is within the tolerance? Roundel Inc. is a company that sells automobile tires. The company is projecting an increase in sales in the next twelve months, and is looking to fill the senior positions through internal recruiting to meet this demand. The company is evaluating the individual performances and seeking to develop some ranking of the individuals within a work group to identify the best performer. Which of the following approaches is the company using? (A) The Result approach (B) The Attribute Approach (C) The Comparative approach (D) The consequential approach (E) The Behavioral approach Oh, no... you dropped your study flashcards, and now they're out of order! Put them back into the correct order for a eukaryotic cell. a. "Combine the mRNA strand with a ribosome and a tRNA carrying a methionine." b. "Unwind the DNA molecule near the promoter." c. "Exit the nucleus to the cytoplasm." d. "Transcribe the complementary RNA strand." Given that three fair dice have been tossed and the total of their top faces is found to be divisible by 3, but not divisible by 9. What is the probability that all three of them have landed 4? Which effect cannot be explained by feature nets? a. the word-superiority effect b. the well-formedness effect c. the ability to read letter strings like pirt but not itpr d. the effects of sentence context? How could a change in emphasis best develop the events in this passage,making for a more interesting and exciting to read?